{"id":483,"date":"2023-07-28T14:40:46","date_gmt":"2023-07-28T12:40:46","guid":{"rendered":"https:\/\/scorp-dev.psn.justbit.it\/en\/?page_id=483"},"modified":"2023-09-28T11:41:50","modified_gmt":"2023-09-28T09:41:50","slug":"security","status":"publish","type":"page","link":"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/security\/","title":{"rendered":"Security"},"content":{"rendered":"<section class=\"module visual-and-content gutter relative flex items-center py-15 md:py-20 lg:py-[100px]  bg-violet-lighter\"     >\n\n        \n  <div class=\"flex-1 max-w-full\">\n\n    \n    \n  <div class=\"container\">\n\n    \n    <div class=\"relative grid grid-cols-4 items-center gap-y-8 md:gap-y-15 gap-x-12 z-50\">\n      \n      <div class=\"col-span-4 md:col-span-2 flex items-center\" data-defer>\n        <div class=\"w-full py-10 max-w-2xl\">\n          <div class=\"flex flex-col gap-y-6 items-start md:gap-y-12 \">\n\n            <h1 class=\"text-h1-mobile md:text-h2 lg:text-h1 font-700 gradient-text\">Polo Strategico Nazionale protects PA data<\/h1>\n      \n      <div class=\"wysiwyg max-md:text-p1 max-md:leading-normal\">\n  <p><b>Security<\/b><span style=\"font-weight: 400;\"> is at the heart of <\/span><b>Polo Strategico Nazionale<\/b><span style=\"font-weight: 400;\">&#8216;s objectives. We want to support <strong>P<\/strong><\/span><b>ublic Administrations<\/b><span style=\"font-weight: 400;\"> in the process of making a <\/span><b>digital transition<\/b><span style=\"font-weight: 400;\"> towards a <\/span><b>cloud<\/b><span style=\"font-weight: 400;\"> environment that will sustainably <\/span><b>protect data<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n\n<\/div>\n  \n  <\/div>\n        <\/div>\n      <\/div>\n\n                <div class=\"max-md:order-10 col-span-4 md:col-span-2\" data-defer>\n          <figure class=\"image overflow-hidden --is-jpg aspect-square\">\n      <picture>\n                  <source srcset=\"https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/PSN_chisiamo_sicurezza_hero-300x263.jpg 300w, https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/PSN_chisiamo_sicurezza_hero-1024x896.jpg 1024w, https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/PSN_chisiamo_sicurezza_hero-768x672.jpg 768w, https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/PSN_chisiamo_sicurezza_hero.jpg 1520w\" sizes=\"(max-width: 767px) 100vw, 50vw\" \/>\n              <img decoding=\"async\" src=\"https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/PSN_chisiamo_sicurezza_hero.jpg\" alt=\"image\" title=\"\" class=\"h-full w-full object-cover !object-contain \">\n    <\/picture>\n  <\/figure>\n\n      <\/div>\n          <\/div>\n\n  <\/div>\n  <\/div>\n\n      <button type=\"button\" class=\"scroll-down group absolute bottom-8 left-1\/2 -translate-x-1\/2 flex flex-col items-center z-50 text-label font-700 max-md:hidden text-blue\">\n\n      Scroll down\n      <div class=\"rotate-90 mt-1\">\n        <div class=\"relative block w-5 h-5 flex-[0_0_20px]\">\n    <div class=\"block\">\n    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" fill=\"none\" viewBox=\"0 0 20 20\" class=\"absolute inset-0 transition-micro invisible group-[:hover:not(.swiper-button-disabled)]:visible group-[:hover:not(.swiper-button-disabled)]:translate-x-1\">\n      <path stroke=\"#786eff\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"m7 18 7-8-7-8\" \/>\n    <\/svg>\n    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" fill=\"none\" viewBox=\"0 0 20 20\" class=\"absolute inset-0 transition-micro group-[:hover:not(.swiper-button-disabled)]:-translate-x-1\">\n      <path stroke=\"#786eff\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"m7 18 7-8-7-8\" \/>\n    <\/svg>\n  <\/div>\n<\/div>\n      <\/div>\n\n    <\/button>\n  <\/section>\n\n\n<section class=\"module visual-and-content gutter relative flex items-center pb-15 md:pb-20 lg:pb-[100px]  bg-violet-lighter\"     >\n\n        \n  <div class=\"flex-1 max-w-full\">\n\n    \n    \n  <div class=\"container\">\n\n    \n    <div class=\"relative grid grid-cols-4 items-center gap-y-8 md:gap-y-15 gap-x-12 z-50\">\n                <div class=\"max-md:order-10 col-span-4 md:col-span-2\" data-defer>\n          <figure class=\"image overflow-hidden --is-jpg aspect-square\">\n      <picture>\n                  <source srcset=\"https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/PSN_chisiamo_sicurezza_hero2-269x300.jpg 269w, https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/PSN_chisiamo_sicurezza_hero2-917x1024.jpg 917w, https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/PSN_chisiamo_sicurezza_hero2-768x858.jpg 768w, https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/PSN_chisiamo_sicurezza_hero2-1375x1536.jpg 1375w, https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/PSN_chisiamo_sicurezza_hero2.jpg 1520w\" sizes=\"(max-width: 767px) 100vw, 50vw\" \/>\n              <img decoding=\"async\" src=\"https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/PSN_chisiamo_sicurezza_hero2.jpg\" alt=\"image\" title=\"\" class=\"h-full w-full object-cover !object-contain \">\n    <\/picture>\n  <\/figure>\n\n      <\/div>\n      \n      <div class=\"col-span-4 md:col-span-2 flex items-center\" data-defer>\n        <div class=\"w-full py-10 max-w-2xl\">\n          <div class=\"flex flex-col gap-y-6 items-start md:gap-y-12 \">\n\n  \n      <div class=\"wysiwyg max-md:text-p1 max-md:leading-normal\">\n  <p><span style=\"font-weight: 400;\">We are committed to designing, setting up, and providing administrations with <\/span><b>highly reliable Data Centers located across the country<\/b><span style=\"font-weight: 400;\"> and dedicated Cloud Services. The focus is on connectivity, service reliability, and <\/span><span style=\"font-weight: 400;\">cybersecurity in order to ensure data confidentiality, integrity, and availability<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n\n<\/div>\n  \n  <\/div>\n        <\/div>\n      <\/div>\n\n          <\/div>\n\n  <\/div>\n  <\/div>\n\n  <\/section>\n\n\n<section class=\"module list-content gutter relative flex items-center py-15 md:py-20 lg:py-[100px]  \"     >\n\n        \n  <div class=\"flex-1 max-w-full\">\n\n    \n    \n            <div class=\"group\" data-defer>\n        <div class=\"container flex justify-center rounded md:rounded-big overflow-hidden mb-12 md:mb-24 group-last:mb-0 py-10 px-5 md:p-15\">\n                      <div class=\"absolute z-0 inset-0\">\n    <img decoding=\"async\" src=\"https:\/\/www.polostrategiconazionale.it\/app\/themes\/psn\/public\/svg\/bg-beans.11a0a7.svg\" alt=\"image\" class=\"object-cover w-full h-full blur-[50px] opacity-50\">\n    <span class=\"absolute opacity-[.05] bg-violet inset-0 z-50\"><\/span>\n  <\/div>\n          \n\n          <article class=\"relative flex w-full max-w-[960px] z-10\">\n            <div class=\"flex max-md:flex-col gap-8 md:gap-6\">\n              <div class=\"w-full max-w-[70px] md:max-w-[100px]\">\n                                  <figure class=\"image overflow-hidden --is-svg \">\n      <img decoding=\"async\" src=\"https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/icon-sicurezza-fisica.svg\" alt=\"image\" title=\"\">\n  <\/figure>\n\n                              <\/div>\n\n              <div>\n                                <div class=\"flex flex-col gap-y-6 items-start md:gap-y-12 \">\n\n            <h2 class=\"text-h4 md:text-h3 lg:text-h2 text-blue\">Physical Security: our highly reliable Data Centers<\/h2>\n      \n      <div class=\"wysiwyg max-md:text-p1 max-md:leading-normal\">\n  <p><b>Physical security<\/b><span style=\"font-weight: 400;\"> plays a key role. Each Data Center is equipped with an automatically activated <\/span><b>alarm system <\/b><span style=\"font-weight: 400;\">which interconnects with public and\/or private surveillance systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These installations are equipped with <\/span><b>external perimeter protection sensors<\/b><span style=\"font-weight: 400;\"> and are guarded as well by <\/span><b>video surveillance and recording<\/b><span style=\"font-weight: 400;\"> systems. System <\/span><b>access<\/b><span style=\"font-weight: 400;\"> is <\/span><b>granted only and exclusively to security personnel <\/b><span style=\"font-weight: 400;\">who are adequately identified according to the relevant privacy rules and procedures.<\/span><\/p>\n<h5><span style=\"font-weight: 400;\"><b>Data Centers in dual Italian regions<br \/>\n<\/b><\/span><\/h5>\n<p><span style=\"font-weight: 400;\">The Cloud infrastructure is hosted by <\/span><b>four Data Centers distributed throughout Italy<\/b><span style=\"font-weight: 400;\">. These Centers have been set up hundreds of kilometres apart in a dual-region configuration (North and South) and in <\/span><b>dual-AZs<\/b><span style=\"font-weight: 400;\"> (Availability Zones), i.e. as a pair of Data Centers working some dozens of kilometres apart in a <\/span><b>business continuity<\/b><span style=\"font-weight: 400;\"> configuration.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The workload is clearly distributed and a HA (High Availability) configuration enables <\/span><b>infrastructure service continuity <\/b><span style=\"font-weight: 400;\">between the two Data Centers in the same region. In this way, we ensure the Cloud platform&#8217;s innate ability to <\/span><b>respond to disastrous events by allowing the resumption of workloads<\/b><span style=\"font-weight: 400;\"> within one of the two AZs or in a different region. The resumption of workloads is thus protected by the activation of a Disaster Recovery (DR)\/Business Continuity (BC) solution. This allows individual PAs to autonomously manage the restarting of each individual application according to their own DR or BC plans.<\/span><\/p>\n\n<\/div>\n  \n  <\/div>\n              <\/div>\n            <\/div>\n          <\/article>\n        <\/div>\n      <\/div>\n          <div class=\"group\" data-defer>\n        <div class=\"container flex justify-center rounded md:rounded-big overflow-hidden mb-12 md:mb-24 group-last:mb-0 py-10 px-5 md:p-15\">\n                      <div class=\"absolute z-0 inset-0\">\n    <img decoding=\"async\" src=\"https:\/\/www.polostrategiconazionale.it\/app\/themes\/psn\/public\/svg\/bg-beans.11a0a7.svg\" alt=\"image\" class=\"object-cover w-full h-full blur-[50px] opacity-50\">\n    <span class=\"absolute opacity-[.05] bg-violet inset-0 z-50\"><\/span>\n  <\/div>\n          \n\n          <article class=\"relative flex w-full max-w-[960px] z-10\">\n            <div class=\"flex max-md:flex-col gap-8 md:gap-6\">\n              <div class=\"w-full max-w-[70px] md:max-w-[100px]\">\n                                  <figure class=\"image overflow-hidden --is-svg \">\n      <img decoding=\"async\" src=\"https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/icon-cybersecurity.svg\" alt=\"image\" title=\"\">\n  <\/figure>\n\n                              <\/div>\n\n              <div>\n                                <div class=\"flex flex-col gap-y-6 items-start md:gap-y-12 \">\n\n            <h2 class=\"text-h4 md:text-h3 lg:text-h2 text-blue\">Cybersecurity<\/h2>\n      \n      <div class=\"wysiwyg max-md:text-p1 max-md:leading-normal\">\n  <p><span style=\"font-weight: 400;\">Our know-how in protecting critical national infrastructure allows us to provide the Hub with solutions and services that ensure the <\/span><b>highest level of protection and cyber resilience. <\/b><span style=\"font-weight: 400;\">We do this through our capacity to <\/span><b>anticipate threats, control risks, and effectively manage any external attacks<\/b><span style=\"font-weight: 400;\">. We also ensure the confidentiality, integrity, and availability of information through protective measures targeting infrastructure, networks, and archives. The measures adopted are commensurate with the existing level of vulnerability to cyber risks and risk analysis is carried out periodically using special assessment tools. This also allows tracking any identified remedial actions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We ensure compliance with applicable laws and regulations, including those relating to information security and personal data protection. These include those applicable to Essential Service Operators (OSEs), Digital Service Providers (DSPs), and entities included in the National Cyber Security Perimeter (<\/span><i><span style=\"font-weight: 400;\">Perimetro<\/span><\/i> <i><span style=\"font-weight: 400;\">di<\/span><\/i> <i><span style=\"font-weight: 400;\">Sicurezza<\/span><\/i> <i><span style=\"font-weight: 400;\">Nazionale<\/span><\/i> <i><span style=\"font-weight: 400;\">Cibernetica<\/span><\/i><span style=\"font-weight: 400;\">\/<\/span><i><span style=\"font-weight: 400;\">PSNC<\/span><\/i><span style=\"font-weight: 400;\">).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Any technical and organisational measures identified will be subject to ISO\/IEC 27001 and ISO 22301 certification. They will also be noted in any specific Security Policies drawn up by our Security Organisation, particularly in relation to IT system and network infrastructure security and compliance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our logical security measures also stipulate that a <\/span><b>\u201csegment\u201d architecture<\/b><span style=\"font-weight: 400;\"> be defined within each end-customer environment. <\/span><b>Policies <\/b><span style=\"font-weight: 400;\">will then be applied in each segment that are consistent with the type of application being hosted.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our logical security system includes creating <\/span><b>a<\/b> <b>dedicated<\/b> <b>segregated<\/b> <b>area<\/b><span style=\"font-weight: 400;\"> in the Data Centers, which is completely <\/span><b>managed<\/b><span style=\"font-weight: 400;\"> by <\/span><b>Polo Strategico Nazionale<\/b><span style=\"font-weight: 400;\"> personnel.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Security Operation Center (SOC) and Computer Emergency Response Team (CERT) work to provide security management for the network infrastructure and all Cloud services.\u00a0<\/span><\/p>\n<h5><span style=\"font-weight: 400;\"><b>SOC<\/b><\/span><\/h5>\n<p><span style=\"font-weight: 400;\">Polo Strategico Nazionale has a <\/span><b>dedicated Security Operation Center (SOC), located outside the Hub&#8217;s Data Centers<\/b><span style=\"font-weight: 400;\">. The SOC manages the security platforms required to address aspects such as device protection or managing access, encryption keys, and policies. The Security Operation Center also monitors the security status of the entire infrastructure.<\/span><\/p>\n<h5><span style=\"font-weight: 400;\"><b>CERT<\/b><\/span><\/h5>\n<p><span style=\"font-weight: 400;\">The Computer Emergency Response Team (CERT) of Polo Strategico Nazionale <\/span><b>is a dedicated entity which is organisationally separate <\/b><span style=\"font-weight: 400;\">from the units managing IT infrastructure and the SOC. It ensures <\/span><b>being able to respond to potential cyberattacks<\/b><span style=\"font-weight: 400;\"> by using tools, procedures, and personnel which focus on assessing threat scenarios and coordinating response actions.\u00a0<\/span><\/p>\n<p><b>CERT<\/b><span style=\"font-weight: 400;\"> provides proactive security services that include cyber threat intelligence, vulnerability assessments, and the ability to identify anomalous behaviour. The aim is to improve the security posture of infrastructures by anticipating threats. With regard to response services, CERT manages reactions to security incidents by defining the best response strategy. The aim is to minimise impacts and restore the affected services as quickly as possible.\u00a0<\/span><\/p>\n<h5><span style=\"font-weight: 400;\"><b>Cryptography<\/b><\/span><\/h5>\n<p><span style=\"font-weight: 400;\">Given the high level of security required by Polo Strategico Nazionale&#8217;s services, <\/span><b>encryption capabilities<\/b><span style=\"font-weight: 400;\"> play a key role in ensuring data sovereignty and protecting and controlling Cloud-stored information. With this in mind, the Hub provides <\/span><b>encryption and key management services <\/b><span style=\"font-weight: 400;\">to ensure data protection needs are met.<\/span><\/p>\n<p>&nbsp;<\/p>\n\n<\/div>\n  \n  <\/div>\n              <\/div>\n            <\/div>\n          <\/article>\n        <\/div>\n      <\/div>\n      \n  <\/div>\n\n  <\/section>\n\n\n<section class=\"module visual-and-content gutter relative flex items-center py-15 md:py-20 lg:py-[100px]  bg-violet-lighter\"     >\n\n      <div class=\"absolute z-0 inset-0\">\n    <img decoding=\"async\" src=\"https:\/\/www.polostrategiconazionale.it\/app\/themes\/psn\/public\/svg\/bg-beans.11a0a7.svg\" alt=\"image\" class=\"object-cover w-full h-full blur-[50px] opacity-50\">\n    <span class=\"absolute opacity-[.05] bg-violet inset-0 z-50\"><\/span>\n  <\/div>\n  \n  <div class=\"flex-1 max-w-full\">\n\n    \n    \n  <div class=\"container rounded-big overflow-hidden\">\n\n    \n    <div class=\"relative grid grid-cols-4 items-center gap-y-8 md:gap-y-15 gap-x-12 z-50\">\n      \n      <div class=\"col-span-4 md:col-span-2 flex items-center max-md:px-5 max-md:pt-15 md:pr-12\" data-defer>\n        <div class=\"w-full py-10 max-w-xl\">\n          <div class=\"flex flex-col gap-y-6 items-start md:gap-y-12 \">\n\n            <h2 class=\"text-h4 md:text-h3 lg:text-h2 text-blue\">Hub Security: people and responsibilities<\/h2>\n      \n      <div class=\"wysiwyg max-md:text-p1 max-md:leading-normal\">\n  <p><span style=\"font-weight: 400;\">Polo Strategico Nazionale <\/span><b>staff<\/b><span style=\"font-weight: 400;\"> working in Security Governance and Management have high-level <\/span><b>cybersecurity<\/b> <b>knowledge and capabilities<\/b><span style=\"font-weight: 400;\">. High-profile project resources are deployed in this area in terms of experience, know-how, and skills.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Hub team has wide-ranging knowledge in:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Information security<\/b><span style=\"font-weight: 400;\">: networking, network infrastructure, routing, database and security infrastructure management, and endpoint management for client-server structures.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Monitoring and control<\/b><span style=\"font-weight: 400;\">: using automatic tools or manual analysis to assure equipment is functioning correctly, appropriately configuring infrastructure, and identifying or classifying events in relation to the type of alarm generated.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Incident<\/b><span style=\"font-weight: 400;\"> and <\/span><b>emergency<\/b> <b>management<\/b><span style=\"font-weight: 400;\">: ensuring rapid and effective governance of IT security-incident containment operations.<\/span><\/li>\n<\/ul>\n\n<\/div>\n  \n  <\/div>\n        <\/div>\n      <\/div>\n\n                <div class=\"max-md:order-10 col-span-4 md:col-span-2\" data-defer>\n          <figure class=\"image overflow-hidden --is-png aspect-square\">\n      <picture>\n                  <source srcset=\"https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/PSN_chisiamo_sicurezza_persone-269x300.png 269w, https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/PSN_chisiamo_sicurezza_persone.png 760w\" sizes=\"(max-width: 767px) 100vw, 50vw\" \/>\n              <img decoding=\"async\" src=\"https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/PSN_chisiamo_sicurezza_persone.png\" alt=\"image\" title=\"\" class=\"h-full w-full object-cover !object-contain \">\n    <\/picture>\n  <\/figure>\n\n      <\/div>\n          <\/div>\n\n  <\/div>\n  <\/div>\n\n  <\/section>\n\n\n<section class=\"module banner-ultra gutter relative flex items-center pt-15 md:pt-20 lg:pt-[100px]  bg-blue\"     >\n\n      <div class=\"absolute z-0 inset-0\">\n    <figure class=\"image overflow-hidden --is-svg h-full flex items-end\">\n      <img decoding=\"async\" src=\"https:\/\/www.polostrategiconazionale.it\/app\/uploads\/sites\/2\/2023\/09\/cerchi_prefooter.svg\" alt=\"image\" title=\"\">\n  <\/figure>\n\n  <\/div>\n  \n  <div class=\"flex-1 max-w-full pb-10 md:pb-20\">\n\n    \n    \n  <div data-defer>\n\n    <div class=\"container\">\n\n      \n      <div class=\"relative grid grid-cols-2 items-center gap-10 md:gap-12 z-50\">\n\n        <div class=\"col-span-2 lg:col-span-1 text-white\">\n          \n          <div class=\"flex flex-col gap-y-6 text-white items-start md:gap-y-12 \">\n\n            <h2 class=\"text-h4 md:text-h3 lg:text-h2 text-white\">Want more information?<\/h2>\n      \n      <div class=\"wysiwyg max-md:text-p1 max-md:leading-normal\">\n  <p><span style=\"font-weight: 400;\">If you have questions about the Agreement, doubts, or specific requests, please visit the dedicated section now.<\/span><\/p>\n\n<\/div>\n  \n  <\/div>\n        <\/div>\n\n        <div class=\"col-span-2 lg:col-span-1 md:justify-center lg:justify-end flex items-center\">\n          <a href=https:\/\/www.polostrategiconazionale.it\/en\/faqs\/  class=\"button relative group inline-flex gap-x-2.5 items-center transition font-global font-700 leading-none transition-micro rounded-full justify-center text-center text-white border border-white\/30 h-[100px] md:h-[200px] text-p1 font-700 md:text-h4 px-12 md:px-24 py-1 gap-x-6 md:gap-x-10 \"       >\n\n  <span class=\"text-inherit group-[&#038;.is-loading]:opacity-0 transition-micro\">See FAQs<\/span>\n  \n      <div class=\"relative block w-5 h-5 flex-[0_0_20px] md:w-10 md:h-10 md:flex-[0_0_40px]\">\n      <div class=\"hidden md:block\">\n      <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"40\" height=\"40\" viewBox=\"0 0 40 40\" class=\"absolute inset-0 transition-micro invisible group-[:hover:not(.swiper-button-disabled)]:visible group-[:hover:not(.swiper-button-disabled)]:translate-x-2\">\n        <path fill=\"none\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"m14.23 35.84 11.9-15.93L14.24 4\" stroke=\"#FFF\" \/>\n      <\/svg>\n      <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"40\" height=\"40\" viewBox=\"0 0 40 40\" class=\"absolute inset-0 transition-micro group-[:hover:not(.swiper-button-disabled)]:-translate-x-1.5\">\n        <path fill=\"none\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"m14.23 35.84 11.9-15.93L14.24 4\" stroke=\"#FFF\" \/>\n      <\/svg>\n    <\/div>\n    <div class=\"block md:hidden\">\n    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" fill=\"none\" viewBox=\"0 0 20 20\" class=\"absolute inset-0 transition-micro invisible group-[:hover:not(.swiper-button-disabled)]:visible group-[:hover:not(.swiper-button-disabled)]:translate-x-1\">\n      <path stroke=\"#FFF\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"m7 18 7-8-7-8\" \/>\n    <\/svg>\n    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" fill=\"none\" viewBox=\"0 0 20 20\" class=\"absolute inset-0 transition-micro group-[:hover:not(.swiper-button-disabled)]:-translate-x-1\">\n      <path stroke=\"#FFF\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"m7 18 7-8-7-8\" \/>\n    <\/svg>\n  <\/div>\n<\/div>\n  \n  <span\n    class=\"spinner absolute left-1\/2 top-1\/2 -translate-x-1\/2 -translate-y-1\/2 opacity-0 transition block w-10 h-10 after:content-[''] after:absolute after:inset-0 after:box-border after:w-full after:h-full after:rounded-full after:bg-white before:content-[''] before:absolute before:inset-0 before:box-border before:w-full before:h-full before:rounded-full before:bg-white after:animate-loadingspinner before:animate-loadingspinner after:animation-delay-1000 group-[&#038;.is-loading]:opacity-100\"><\/span>\n\n  <\/a>\n        <\/div>\n\n      <\/div>\n    <\/div>\n  <\/div>\n\n  <\/div>\n\n  <\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":11,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-483","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The security of Polo Strategico Nazionale data<\/title>\n<meta name=\"description\" content=\"Polo Strategico Nazionale is committed to guaranteeing the security of Public Administration data in the digital transition.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security\" \/>\n<meta property=\"og:description\" content=\"Polo Strategico Nazionale is committed to guaranteeing the security of Public Administration data in the digital transition.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"Polo Strategico Nazionale\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-28T09:41:50+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/security\/\",\"url\":\"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/security\/\",\"name\":\"The security of Polo Strategico Nazionale data\",\"isPartOf\":{\"@id\":\"https:\/\/www.polostrategiconazionale.it\/en\/#website\"},\"datePublished\":\"2023-07-28T12:40:46+00:00\",\"dateModified\":\"2023-09-28T09:41:50+00:00\",\"description\":\"Polo Strategico Nazionale is committed to guaranteeing the security of Public Administration data in the digital transition.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.polostrategiconazionale.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About us\",\"item\":\"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.polostrategiconazionale.it\/en\/#website\",\"url\":\"https:\/\/www.polostrategiconazionale.it\/en\/\",\"name\":\"Polo Strategico Nazionale\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.polostrategiconazionale.it\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The security of Polo Strategico Nazionale data","description":"Polo Strategico Nazionale is committed to guaranteeing the security of Public Administration data in the digital transition.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/security\/","og_locale":"en_GB","og_type":"article","og_title":"Security","og_description":"Polo Strategico Nazionale is committed to guaranteeing the security of Public Administration data in the digital transition.","og_url":"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/security\/","og_site_name":"Polo Strategico Nazionale","article_modified_time":"2023-09-28T09:41:50+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/security\/","url":"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/security\/","name":"The security of Polo Strategico Nazionale data","isPartOf":{"@id":"https:\/\/www.polostrategiconazionale.it\/en\/#website"},"datePublished":"2023-07-28T12:40:46+00:00","dateModified":"2023-09-28T09:41:50+00:00","description":"Polo Strategico Nazionale is committed to guaranteeing the security of Public Administration data in the digital transition.","breadcrumb":{"@id":"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.polostrategiconazionale.it\/en\/about-us\/security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.polostrategiconazionale.it\/en\/"},{"@type":"ListItem","position":2,"name":"About us","item":"https:\/\/www.polostrategiconazionale.it\/en\/about-us\/"},{"@type":"ListItem","position":3,"name":"Security"}]},{"@type":"WebSite","@id":"https:\/\/www.polostrategiconazionale.it\/en\/#website","url":"https:\/\/www.polostrategiconazionale.it\/en\/","name":"Polo Strategico Nazionale","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.polostrategiconazionale.it\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.polostrategiconazionale.it\/en\/wp-json\/wp\/v2\/pages\/483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.polostrategiconazionale.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.polostrategiconazionale.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.polostrategiconazionale.it\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.polostrategiconazionale.it\/en\/wp-json\/wp\/v2\/comments?post=483"}],"version-history":[{"count":14,"href":"https:\/\/www.polostrategiconazionale.it\/en\/wp-json\/wp\/v2\/pages\/483\/revisions"}],"predecessor-version":[{"id":1111,"href":"https:\/\/www.polostrategiconazionale.it\/en\/wp-json\/wp\/v2\/pages\/483\/revisions\/1111"}],"up":[{"embeddable":true,"href":"https:\/\/www.polostrategiconazionale.it\/en\/wp-json\/wp\/v2\/pages\/11"}],"wp:attachment":[{"href":"https:\/\/www.polostrategiconazionale.it\/en\/wp-json\/wp\/v2\/media?parent=483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}